Skip to main content
5:30 pm
that is a pretty clean way to do that. >> we will have to leave it there. thank you. >> this weakened on news maker, betty staton now -- debbie. jonas here on c-span -- join us here on c-span2 >> with a lot about their coverage, it is very thorough. -- what i like about c-span, it is a very thorough.
5:31 pm
the debates on the floor and the hearings that you cover for subcommittees and major committee hearings. >> she watches c-span on comcast. c-span, created by america's cable companies in 1979, brought to you as a public service by your television provider. >> next, a look at how data analysis helps public health and safety. speakers include the key to digital officer in new york city. is is part of the world in 2013 festival at new york university, hosted by the economist magazine. it is about 25 minutes. >> welcome back. i wanted to introduce this session. we have been hearing about data
5:32 pm
and how it is an increasingly powerful force in our lives. we will talk exactly about that. the are looking forward to a lively debate. the first speaker is the honorable shirley jackson. the president a wrestler polytechnic institute -- of renselar polytechnic institute. [applause] >> midafternoon. -- good afternoon. there is a significant transformation under way globally and awaiting make predictions, make connections and a ultimately -- and the way we make predictions, make
5:33 pm
connections. the transformation is being driven by the rapid expansion and availability of data from multiple sources. and competition a capacity generating new information. let me begin with a vignette. as super storm sandy was beginning to gather steam, five days before it slammed into new jersey and we york, u.s. forecasters predicted a monster storm but were not certain of its path. by most indications, this unusually powerful storm would grace the coast but moved back out into the north atlantic. reports of thes european model, predicting a sharp left turn. the u.s. and european models a bench and the converged but the europeans got it right first,
5:34 pm
giving a little more time -- european models eventually converge but the europeans got it right first, giving a little more time. newly available information, how is accessed, will become ever more vital as the force that shapes and changes our world. dick in and innovation will be a driver for changes data innovation will beg a driver for changes. there is a rapidly growing network of networks. on which our daily lives stand, including power, water, retail, and social networks. together, these comprise our high-performance computing center.
5:35 pm
all driven by the interplay of data systems, high-performance computing and analytics. i predict that big data and network sites are going to merge, marrying the internet of data with the internet of things in new ways. this will be world changing. just as in the 1800's there was a shift. so too now are we in the midst of a shift in the day that at the commodity. and data as the resources in ways not previously imagined. new tools are being engineered that will enable us to take massive amounts of structured data anducture d create useful information.
5:36 pm
data has grown to more than 1 million. the numbers are expected to exceed 10 million by 2015. the -- one of the craters of the semantic web crack -- collaborating with the white house has developed an interface. the infrastructure and technology they have created makes it possible for others to .ash up data sets and if we take full advantage of these emerging technologies, new opportunities will be created by the end of the the with smart analytics to anticipate and predict events and to mitigate them. the intersections and interactions are complex. outcome can be powerful. we will be able to see
5:37 pm
connections we would not have seen otherwise that have better predicting capabilities. particularly on the trending of things risky in intercom activity can sometimes lead to unintended consequences. as we saw in the devastating ways with energy communication and transportation systems and the aftermath of sandy, interconnected the present enormous opportunity -- interconnecting presents enormous opportunity. networks will grow rapidly in the next year and beyond. if we are able to take advantage of the ubiquity of day, the interconnect today of data and things and powerful new analytical and computational skills to stay ahead of the curve, the future is ours. but there may be questions about
5:38 pm
the information so i further predict to gain new information and insights from data and the ability to mary detente with things, new economic models will emerge. both data at rest and data at motion. it will be growing in a complex of the modernization of data. particularly with respect to ownership, privacy and security. we have to ask questions of whether our policies can keep up. how will this turned out? only time will tell. [applause] >> it is my pleasure to introduce new york city first chief of digital officer. is working to, the relationship
5:39 pm
between the government and the public -- she is working to commoditize and the relationship between the garment and the public online. >> thank you so much. i am very happy to follow jillion jackson. i agree with everything she just said. i will be fairly brief and had a couple stories. new york city has a very data driven mentality and we have it data driven mayor. what we see is our prediction and in some ways, it is already starting to be realized. in coming years, governments will use data to help improve the ways we deliver services to the public, to help anticipate problems before they become problems, and ultimately to [ indiscernible].
5:40 pm
making sure that agencies are able to share that data. dam it what to make sure a city to city in government to government, we are sharing data. -- then we want to make sure from city to city to government to government, we're sharing data. a couple examples include some of the works being done by mike flowers. the city today has over 900 open data sets available to the public. he uses data to help save lives kristy as correlated data sets previously that have never come together. we have been able to reduce firefighter injuries by 15 percent because he and his team can identify and increase like the nets that has been an
5:41 pm
illegal conversion -- the likehlihood there has been an illegal conversions. they looked at a map and saw clusters all over. it turns out people operating ambulances need three things 247 -- food, coffee and the place to go to the bathroom. and by finding other places where you conserve those three needs, they were able to reduce the response time by eminent which is a critical amount of time -- by a minute which is a critical amount of time. when mayor bloomberg issued an order to evacuate, we had an influx of traffic that our servers were struggling to keep
5:42 pm
up with the request for people try to find out which hurricane evacuation zone they were in. we shared that data with google's crisis group, the new york times. they had built a functioning, interactive hurricane evacuation zone map that served that function and help us to do our job. we estimate it served 10-20 times more people the league would have been able to on our own. this did that creates the potential -- this data treat the potential to reduce a much more damage could on our own. thank you very much. [applause] >> could you talk about what he learned from hurricane dansy you useout how
5:43 pm
data? >> we have learned an enormous amount. also with hurricane irene, we were already starting to share that data. we knew it was critical to have the data out in a format that was easy to use. they first had to establish the new hurricane evacuation zone they get it out there in a format that was critical. we have already done a couple of postmortums -- it is critical we have the infrastructure in place before hand and the data in a standard way. in a real time format.
5:44 pm
it is often stored in different ways and has different titles and catheterizations. it can be difficult to bring together -- different titles and categorizations. it can be difficult to bring together. >> i think that's one of the things we are actively doing right now. we are looking at ways we can collect that data from the public which is a very new thing for government to consider how do we make sure it is authoritative enough when it comes to the average citizen? how do we acknowledge that in new york city, we have one of
5:45 pm
the most connected, technologically savvy populations in the world in a to be a powerful source of data if they are willing to help -- and they can be a powerful source of data if they are willing to help. >> i was struck by the power position and something troubling about everything you are doing. talking about government holding this vast amount of data. that will be troubling to people. it is not just privacy of the question of how much is knowable? as human beings, we walk around kind of expecting a certain amount of privacy. we do not expect the government to be able to drill down to our neighborhood and know how many crimes, how many parking tickets, how many term at -- all
5:46 pm
the things that become layer upon layer. on top of that, you have who votes how and what they buy. >> but that horse is out of the barn. i think the real question is how do we keep -- create a collective viewpoint about how we use data? let me go back to hurricane sandy. it industries and number of the point i was trying to make. you've already talked about a lament of statistics of disasters. there is ability to be more sophisticated and to do modeling not only beforehand but in real time. to engage citizens and helping to feed those models. that requires a lot of
5:47 pm
capability infrastructure. the second part has to do with predictive capabilities. the model to not just depend -- depend on data from the internet. they come from things. buoys, tellites, be airliners. the mission is how you bring all that together in a way that can improve capability as well as having smart networks where what happens in one part of the network does not just come in in one way but can inform happens to the other states in that network. the final piece in terms of planning, you talked about how to build cities better. 8.3 million people are already
5:48 pm
living here. there is another kind of internet of things that can play into all of these. that has to do with infrastructure modeling and monitoring. that becomes its own internet of things. that contain something about how the infrastructure is holding up -- can tell you something about how the infrastructure is holding up, especially when you have certain events. that complaint to the disaster response model. -- can play into the disaster response model. >> so the building will make a 911 call as well as the human being? >> de facto. why send firefighters or the emergence of response people
5:49 pm
into some facility that is about to collapse? >> what did you say, that we need to come to some kind of consensus? > i'm saying we need more conversations about the common good, the common will. and to animate those discussions with examples. the question is, how you protect your privacy? well, in the beginning, it starts with you. many of us have so much of ourselves out there, whether it is facebook, twitter, whatever. that is what we have to think about. in a way once the digital
5:50 pm
footprints are created, they last for a very long time. maybe there is a cloak of privacy that comes from the ubiquity of data itself. that it becomes so much there that it is of less interest. >> what i find intriguing is the extent to which it was possible to mary big data and consumer data em predict -- and predict. you can call it whatever you like but it does not really matter whether they know exactly how i'm going to vote. they know i will not by a hummer saidthat i hav pe a prius they may be able to guess i am more likely to volunteer kirk vote democrat -- or vote
5:51 pm
democrat. it seems i did not have to give away very much and you already know me. maybe you could talk about the economic consequences of some of the predictions have been making. >> if you think about the impact structural consequences for new jersey and new york with the government's made appeals to washington for support in the range of about $70 billion, that shows the consequence of a cascading type consequence. on the other hand, one can use the data to strengthen infrastructure. to create new models that go
5:52 pm
into new codes that can lead to new ways people develop impress structure which can create new enterprises but also strengthen the economic basis of the city or the country. when that also was talking about economic models, the value is in how the data is put together. and how you monetize that valley. -- tha value is an unquestioned. maybe you have some thoughts about that. >> i will go back a little bit too. maybe we should think about framing it as, would be here are the public a lot as they want the state that. they say that is my data and by opening it up, i think there is a whole element of you are in
5:53 pm
powering people in a way to have information that is unprecedented. the level of the formation the average citizen has access to has never been at the state. it helps us to potentially have more informed citizenry in the case population. >> we talked before about the apps people have built on top of your detente request the city hosts in number of hack-a-thons and contests. we threw this contest at no taxpayer.he secure now 150 using city dtata. from finding a green market close to you to more fun things that if you check into a restaurant, it is in danger of
5:54 pm
being closed because of a health code violations. get a big alert called "don't eat at." there is a wide range. we are looking at how the rematch make a little better between the needs of our immediate need yorkers and the one of the capabilities of our tech community carries so many people get to give back. there is no greater sandbox than a city like new york. increased at best -- a great opportunity to solve a interesting problems. >> did that does not always have to have personal identifiers attached, -- data does not always have to have a personal and a mission attached. -- personal identifiers
5:55 pm
attached. >> whenever you talk to anybody using this data, they say they abide by the rules but nevertheless, and would you not agree with are moving in a particular direction and is seen there is only one way, fort, with more sharing and -- one way, forward, with more sharinga nd data. >> you cannot go backwards. i tink all we -- think all we can do is be as thoughtful and strategic about it as we can, going forward. >> to use the very into connectivity to create new types of conversations in terms of public awareness has changed. it connects us with people in different ways, across cultures.
5:56 pm
that is a good thing. it can help us have different kinds of conversation. >> i would like to thank my g uests. [applause] [captioning performed by national captioning institute] [captions copyright national cable satellite corp. 2012] >> tomorrow on washington journal, the 113th congress and how president obama will govern in the year ahead. we are joined by john fehery and jim manley. recent efforts to increase salaries and perks of congressional service. our guest is daniel schuman. later, a discussion about president obama's foreign-policy agenda. washington journal, live at 7:00 a.m. eastern here on c-span. >> it is true that the people's history is the results of
5:57 pm
synthesizing the work of a great many other historians. what happened in the 1960's with the counterculture was that a whole new generation of young historians have come up. and they were reevaluating all aspects of our past. >> martin duberman on the life of howard zinn tonight at 10:00 eastern on c-span2. like us on facebook. >> more now from the world in 2013 festival, hosted by the economist magazine. this is a discussion on cyber security threats richard clarke. he talked about chinese cyber espionage in u.s. vulnerability to a possible iranian cyber attack.
5:58 pm
this is just over 20 minutes. >> our next session is on the subject of a cyber war in 2013. let's hope it does not come to a real war. dick clarke is the president of good harbor consulting and the author of cyberwall. please welcome him for his predictions [applause] >> thank you and good afternoon. when i was in the intelligence business, i told president and secretaries of state that i do not make predictions. they did not like that. nor did they like my prediction. predictions are difficult but i can say a few things about cyber
5:59 pm
security and the cyber war in the next year. we can sit with high confidence that hundreds -- say with high confidence that hundreds of millions of dollars will be stolen next year by cyber criminals. who will not get caught. cyber crime pays. we can also say with high confidence that fiber espionage, that that the intellectual property, research and development, even transactional and permission, will result in the loss of billions of dollars. as nation states steal a permission from american and european companies and give it to chinese companies -- steal information from american and european companies and give it to chinese companies. that will go on next year as it
6:00 pm
has been going on. what about cyber war? leon panetta said last month that we are at a pre 9/11 moment when it comes to cyber war. he said there are people he was he did not say it. iran had just engaged on an attack of the saudi arabia company wiping clean 30,000 computers. it was the largest attack so far seen. and the iranians had been behind on a serious of u.s. banks, ten times larger thanning the seen before. it knocked u.s. banks offline one day, one bank after another. if the united states and israel
6:01 pm
bomb iran next year to stop the nuclear program i think we can say with high confidence that iran will retaliate. since israel or united states have attacked their homeland iran will attack in our homeland. not with terrorism but with cyber war, knocking out banking prehaps, electricity, causing havoc and getting away with it because we cannot defend successfully today against that kind of attack. [applause] >> that's a sobering thought to start a conversation with. as it happened, there were two pages in this week's "economists" that you should have on this subject on cyber war and i think it is helpful,
6:02 pm
if you can walk us through what exactly is meant by cyber war. you, yourself, mention cyber crime, cyber espionage there is a blurring of the lines. what do you mean by cyber war? >> you can rebbe using the word chuw. criber crime which is successful -- cyber crime which is successful. the cyber espionage which i think is the most serious thing today, that is the theft not 06 money but information, -- not of money but information, research and product information.
6:03 pm
it gives certain countries like china an unfair economic advantage. then the cyber war, we haven't seen very much of yet. arguably you can say when the united states destroyed some nuclear centrifuges in iran, physically destroyed them with a cyber attack, that was war. for me, the definition of war is disruption, destruction, or damage. not just turning out the lights but destroying them the generator so it can't come back on. we've demonstrated that can be done in experiments. in fact, you can go to youtube and look up up the aurora experiment and the generator is
6:04 pm
blowing itself up. leon panetta talked about commands that cause trains to derail. a basically, everything we do all day long these days is connected to a network. we do have the internet of machines talking to machines and machines talking to machines and we haven't secured it. >> it is still at the state where no one has died in a cyber war, is that right? >> i think it is right. >> not to diminish -- not diminish it. >> if it is a national security issue we think people have to
6:05 pm
die before we think it is important. if that is our criteria, fine. that said, all the espionage that is going on, all the economic damage that is going on isn't important because no one is dying. if new york city were thrown in the darkness, if the lights went out and stayed out for a week and the u.s. economy was thrown into a tail spin, people may not die as a result of that. but if you're in a house and you can't get food because the rail system is disrupted and the power system is disrupted and you can't get money out of the a.t.m. machine you might be upset. >> the fiber elements of convectional warfare would be
6:06 pm
quite important in the early stages. the first thing you might want to do is knock out the capeabilities of your enemy or worried they are knocked out. >> in 2008, when russia ininvaded georgia, the nation of georgia. as the russian tanks crossed the border a cyber attack hit georgia and knocked out its telecommunications, it's banking and the communication to the outside world. cyber war will probably always be part of a larger war. cyber war will only happen when the nation is going to go toward anyway. no nation is going to say i have a new chinese cyber weapon let's go toward and see if it works.
6:07 pm
we've had nuclear weapons and nine nations have them and no one has used one since 1945. if the united states and iran get into a shooting war next year, which is possible, they there will probably be a cyber dimension to it and it will probably be brought to this country. >> who is doing or who might do cyber war to whom? the united states is not an innocent bystander in all of this. it has practiced a degree of cyber war, who else -- who are the super powers of cyber war? >> so the c.i.a. says there are between 20 and 30 countries that have cyber warfare units with significant capabilities. the nations that have announced it are the usual suspects, china, russia, israel, united
6:08 pm
kingdom, germany. north korea has it believe it or not. i was there last month talking to their cyber unit. so a lot of people have it and the interesting trend here is the skills sets required to do offensive cyber war are prelive rating rapidly. years ago we could have said that the united states and russia has the capabilities, it is far broader because it is cheap. >> the economists asked this week that there is actually a cyber command. >> we have a four-star general running something called cyber command and it has 27,000 people in it. it has a navy component which is the 10th fleet, it has no ships,
6:09 pm
no boats, it is in cyberspace. we have an air force that has no planes or missiles, it is in cyberspace. >> a couple other things before we open it up to the audience. you talk about what might be called cyber offense but there is the question of cyber defense. how good is the united states at each of those? >> so the united states is very good at cyber offense as it demonstrated. it made a mistake but the attack package was supposed to destroy itself after it killed the centrifuges and it didn't. it escaped and ran around the internet. you can find it on the internet if you want to download it. i would not suct that. it will only destroy an iranian
6:10 pm
nuclear power plant so if you don't have one of those you're ok. united states is bad at defense as is everybody else. the nature of the technology is such that we call it offense preference. it costs thousands of times the amount of money to defend as it does to attack. >> the opposite of cyber war is cyber peace. how do you get to cyber peace? is there a cyber squev -- eequivalent lent of cyber control? >> nations are beginning to talk about things they can do to reduce tension. both the united kingdom and the united states have open talks with russia on cyber risks reductions. which is communication channels and transparency measures. we have to begin with small
6:11 pm
steps. frankly, when we began nuclear arms control i was involved in that and people said we would never get there. they said that about chemical arms control and we got that but it took 10 or 15 years. so maybe we should start now. >> let's take some questions from the audience. a lot of questions. let's take the third row here then the gentleman in the middle there at the back. >> hello. i feel like the things you have said i've heard it about 12, 13 years ago with the year 2k problem. we said the wall streets will go down and the banks will be wiped out. nothing happened. you can cash in a car.
6:12 pm
so i'm thinking that, you know, these are by design that you can issue commands to do these things. i feel -- i'm on the skeptical side is it that easy to come in and blow up stuff? >> well, first of all, in y2k what would have happened if we had not spent millions of dollars changing everything and it is hard to tell. but we did around the world and particularly in the united states spent billions of dollars fixing the y2k bug rolled around which may have something to do why nothing happened. i hope there is hype. i hope i'm wrong. other people seem to agree with me though.
6:13 pm
we're spending a lot of money in cyber commands and other countries have these cyber commands and that suggest to me that i'm probe right. >> gentleman in the middle. >> hi. i would like to know if your perspective on the concept of full spectrum dominance and whether that is realistically achieveable? >> i find it disturbing in the last few years that this phrase has crept into the u.s. military of dominance. it is a little kinky having our admirals talking about dominance. i think it is also a little arrogant, frankly. what we should talk about is cyber security, offensive cyber
6:14 pm
capability, defensive capability. we turn a lot of people off in this country and around the world, when we have generals and admirals talking about dominating the cyber domain. we need cooperation from a lot of people around the world and in this country to achieve cyber security. militaryizing the issue and talking about how the u.s. military has to dominate the cyber domain is not helpful. >> we have lots of hands going up. let's take two or three questions together. right in the middle here then the gentleman in front of you as well. >> ok, thank you. this year has been around the
6:15 pm
world for u.s. and other companies, what is wrong with china doing the same thing? >> basically, the panel said that big data will merge with the fiscal network of things. will that make the u.s. more vulnerable to a cyber attack or does that give us more possibilities to defend ouselves? >> that is a good question. >> on the china question, the question is what is wrong with china spying? i don't think there is anything wrong with china spying. i think what is wrong with what china is doing in vlings of the rules is having their government -- violation of the rules is having their government take information from private sector companies then they sell their
6:16 pm
products in the united states so u.s. taxpayers pay for the r.n.d., the chinese companies get it for nothing. that's an unfair economic advantage. the united states does not do that. the united states does not package rolls royce engines and give it to general electric engines. you can believe that or not but i can tell you we don't do nap with regard to big data and the network of things, it is the network of things that makes us vugger inable. it is machines talking to machines. those machines automatically do things when given certain commands. all of those networks are connected to the internet. the electric power companies will tell you that their networks are not connected to
6:17 pm
the internet and every experiment that the u.s. had conducted they are able to get to the command network from the internet. >> let's take a couple of questions. lady here in row four. then down here in front. we'll take those questions together. >> going back to the topic of cyber war. what are the implications when you talk about the vulnerability to defend when we're acquiring military equipment that is depend event on programs and codes? >> one more from the front here. >> thank you very much. how does the u.s. normally react to cyber attacks?
6:18 pm
how much damage and how much rules are around and what is the appropriate response to a certain time of attack? >> you have to chew on that for one minute. >> ok. the president issued a secret directive last month establishing the rules for cyber war and for cyber attack. to date, i don't think there has been retaliation. in the shortest way possible, the united states has said it will consider the extent of the damage done regardless how it is done, if it is done by a missile or cyber attack and we will retall appropriately to what they did not how they did it. the vaft amount of the codes were stolen before the plane
6:19 pm
ever flew. it was stolen by friendly agent government. you may well think that in the future, if there around war, if, weapon systems may roll out on the battle fenald not work. -- field and not work. >> thank you very much. we're out of time. >> this weekend on "newsmakers" we're joined by debbie stabenow she talks about the farm bill and other legislation in the senate. >> the big discussion that i remember was what is richard nixon going to do? >> i can remember going home and being scared to death. this is like a time bomb. if this gets

Big Data Cybersecurity
CSPAN January 5, 2013 5:30pm-6:20pm EST

Series/Special. Two panels discuss 'big data'; cybersecurity assessment. New.

TOPIC FREQUENCY U.s. 12, United States 12, China 7, Us 6, New York City 5, Iran 4, New York 4, Russia 3, Washington 3, Israel 3, Sandy 2, The Nation 2, Cyberspace 2, United Kingdom 2, Leon Panetta 2, Data 2, Dick Clarke 1, Martin Duberman 1, Richard Nixon 1, Royce 1
Network CSPAN
Duration 00:50:00
Scanned in San Francisco, CA, USA
Source Comcast Cable
Tuner Channel 91 (627 MHz)
Video Codec mpeg2video
Audio Cocec ac3
Pixel width 704
Pixel height 480
Sponsor Internet Archive
Audio/Visual sound, color

disc Borrow a DVD of this show
info Stream Only
Uploaded by
TV Archive
on 1/5/2013